Skip to main content

Secured Domain of Sensor Nodes - A New Concept

  • Conference paper
  • First Online:
Innovations for Community Services (I4CS 2018)

Abstract

For the procedures of creating situational awareness an important element is the freshness (timeliness) of data and the credibility of information sources. A modern and rich source of such data may be sensor networks, but their use as a reliable source of data is a major challenge mainly because the sensor nodes in the network are usually mobile, use wireless links, have a small computing power and have small energy resources. The paper presents a new concept of a secure sensor nodes domain, which is a very reliable source of sensor data. The data transferred inside the domain are protected by cryptography, cryptographic material stored in the resources of sensor nodes is also protected by cryptography, and data obtained from sensor nodes from the place of their acquisition to the sink node are protected. Trusted Platform Module (TPM) is used to support the process of securing the data in the domain. In the second part of the paper developed a secured domain demonstrator for sensor nodes is described, which illustrates the functioning of the key elements of the concept presented.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    Sensor node - the element of sensor network, which includes at least the measuring element (sensor), microcontroller and communication module that allows transfer of measured data through wireless connections.

    Sensor - measuring component of the sensor node.

  2. 2.

    This implementation of a secure domain demonstrator uses the TPM 1.2, which offers support for RSA 2048, but there is nothing to prevent the use of the TPM 2.0, which allows the use of ECC cryptography.

  3. 3.

    Used module meets the requirements described in Security Policy for Atmel TPM 9, as well as the strength requirements of FIPS 140-2, Level 2 7.

References

  1. Al-Haija, Q.A., Tarayrah, M.A., Al-Qadeeb, H., Al-Lwaimi, A.: Tiny RSA cryptosystem based on arduino microcontroller useful for small scale networks. Procedia Comput. Sci. 34, 639–646 (2014). https://doi.org/10.1016/j.procs.2014.07.091

    Article  Google Scholar 

  2. Furtak, J., ZieliƄski, Z., Chudzikiewicz, J.: Secure protocol for wireless communication within military IoT. In: 2015 IEEE 2nd World Forum on Internet of Things, WF-IoT 2015, pp. 508–513 (2015)

    Google Scholar 

  3. Furtak, J., ZieliƄski, Z., Chudzikiewicz, J.: Security techniques for the WSN link layer within military IoT. In: 2016 IEEE 3rd World Forum on Internet of Things, WF-IoT 2016, pp. 233–238 (2016)

    Google Scholar 

  4. IDQ, Quantis AIS31 Brochure https://marketing.idquantique.com/acton/attachment/11868/f-0220/1/-/-/-/-/Quantis%20AIS31_Brochure.pdf

  5. Jonsen, F.T., et al.: Application of IoT in Military Operations in a Smart City presented at the IEEE International Conference on 2018 Military Communications and Information Systems (2018)

    Google Scholar 

  6. Koteshwara, S., Das, A.: Comparative study of authenticated encryption targeting lightweight IoT applications. IEEE Des. Tests 34(4), 26–33 (2017). https://doi.org/10.1109/mdat.2017.2682234

    Article  Google Scholar 

  7. Requirements For Cryptographic Modules. Federal Information Processing Standard (FIPS 140-2), National Institute of Standards and Technology, 03 December 2002

    Google Scholar 

  8. Puschmann, D., Barnaghi, P., Tafazolli, R.: Adaptive clustering for dynamic IoT data streams. IEEE Internet of Things J. 4(1), 64–74 (2017)

    Google Scholar 

  9. Trusted Computing Group. TPM Main Part 1 Design Principles. Specification Version 1.2. Revision 116, Trusted Computing Group, Incorporated (2011)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Janusz Furtak .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2018 Springer International Publishing AG, part of Springer Nature

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Furtak, J., ZieliƄski, Z., Chudzikiewicz, J. (2018). Secured Domain of Sensor Nodes - A New Concept. In: Hodoƈ, M., Eichler, G., Erfurth, C., Fahrnberger, G. (eds) Innovations for Community Services. I4CS 2018. Communications in Computer and Information Science, vol 863. Springer, Cham. https://doi.org/10.1007/978-3-319-93408-2_15

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-93408-2_15

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-93407-5

  • Online ISBN: 978-3-319-93408-2

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics